Back to list
Feb 28 2008 09:28PM
rPath Update Announcements (announce-noreply rpath com)
rPath Security Advisory: 2008-0082-1
rPath Linux 1
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
rPath Issue Tracking System:
Previous versions of the espgs package are vulnerable to an Arbitrary
Code Execution attack in which an attacker may use a maliciously crafted
PostScript file to trigger a buffer overflow.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html
[ reply ]
Copyright 2010, SecurityFocus